Analysis
-
max time kernel
88s -
max time network
104s -
platform
windows10-2004_x64 -
resource
win10v2004-20230221-en -
resource tags
arch:x64arch:x86image:win10v2004-20230221-enlocale:en-usos:windows10-2004-x64system -
submitted
09/03/2023, 10:53
Static task
static1
Behavioral task
behavioral1
Sample
bebra.exe
Resource
win7-20230220-en
2 signatures
150 seconds
General
-
Target
bebra.exe
-
Size
13.9MB
-
MD5
6dac8c5381ae3101d911145970bdde93
-
SHA1
04c1cbac48c640f3c54c0ec6086aa3eb181da696
-
SHA256
6888c253f7fe673389ea592d69e1844c81eb01f313514df88f9dbdebad514aa8
-
SHA512
1fc5b7de2f4033e2275ae01631006553e81ed0c541fdbfeee8533640e21e1033c324249a27861d85f0b07895df335fe5f013563da248a14ef6faa50ab4ad1610
-
SSDEEP
98304:4ivsPFrDUiYmacrsUj8f0AQvguuE5/4RzXDExRf00:nydUi5ac7j3A0gmKRzg
Malware Config
Signatures
-
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2196 wrote to memory of 3940 2196 bebra.exe 84 PID 2196 wrote to memory of 3940 2196 bebra.exe 84 PID 3940 wrote to memory of 4000 3940 cmd.exe 86 PID 3940 wrote to memory of 4000 3940 cmd.exe 86
Processes
-
C:\Users\Admin\AppData\Local\Temp\bebra.exe"C:\Users\Admin\AppData\Local\Temp\bebra.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:2196 -
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /C choice /C Y /N /D Y /T 0 &Del C:\Users\Admin\AppData\Local\Temp\bebra.exe2⤵
- Suspicious use of WriteProcessMemory
PID:3940 -
C:\Windows\system32\choice.exechoice /C Y /N /D Y /T 03⤵PID:4000
-
-